Does your legal counsel understand your customer? Your business? Your industry?
At Ifrah Law, we understand all three and we strive to provide you with the expertise that will help you grow your business!...more

Employees are reasonable in assuming that their employer is protecting their personal information from compromise. The obvious way to do that is to maintain appropriate encryption technology. Simply put: encryption,...more

Tens of thousands of cyber attackers employed by Chinese People’s Liberation Army and other employees and contractors of the Chinese Ministry of State Security work diligently every day to steal information from U.S....more

On 6 May the European Commission released the EU’s Digital Single Market strategy (the ‘DSM Strategy’), with the declared objective to tear down the obstacles to doing business online. The DSM Strategy has been released...more

There are so many legal issues in Episode 15 that it’s hard to know where to begin, so I’m going to start at the end: porn. Pied Piper is competing against nemesis Endframe for a $15 million contract from the online porn...more

As the INTA Annual Meeting winds down, one memory for me that certainly stuck out was an on-site ad campaign revolving around the new “.sucks” top-level domain (“TLD”). Depending on whom you ask, it’s either ingenious or...more

In recent years, the Internet Corporation for Assigned Names and Numbers (ICANN), the non-profit entity responsible for maintaining the Domain Name System of the Internet, has begun to introduce hundreds of new top-level...more

The registration policies and pricing for .sucks domain names paint trademark owners into a corner. This alert explains the defensive registration options for mark owners, although there are no “good” options. The new gTLD...more

When I served as California’s Commissioner of Corporations, Internet commerce was just finding its legs and we were concerned about how to apply the Corporate Securities Laws to this new technology. For state regulators, the...more

Having strong cybersecurity policies is critical for protecting a company's business, as the amount of commerce conducted over networks and the Internet increases each year. Last month the Congressional Research Service...more

The stakes are getting higher regarding cybersecurity. However, there are several steps organizations can take to protect against cybersecurity data breaches. Further, taking these steps can protect companies in the context...more

Effective information governance is about taking information — your most important business asset — and looking at ways to better leverage it in a manner that streamlines the business processes, and reduces costs and risk....more

Concern over higher valuations? Apparently not, as $59 billion invested in 2014 breaks the post-crisis record. LPs also set a post-crisis record with $32 billion in commitments to U.S.-based VC funds. PitchBook Data, Inc.,...more

A reading recap of some of the most well-read Cybersecurity pieces on JD Supra in January, 2015 -- covering a broad range of legal and compliance issues, from cyber insurance to could computing to President Obama's...more

On January 21, Governor Cuomo delivered his State of the State address, along with proposing the new budget. The budget has a number of new tax proposals. One of those proposals would have a significant impact on e-commerce...more

As we previously reported, a company’s social media pages and profiles, and the associated followers, friends and other connections, may constitute valuable business assets. In our experience, however, social media assets...more

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.